Exposing Russian Interference - The Value of Real-Time Forensics

by Daniel Hoffman

Russian President Vladimir Putin has sought to exploit open and free U.S. cyberspace, which serves as a force multiplier for commerce and freedom of expression, with hacking and discoverable...

Ghosts in the Machine that Can Rob You Blind

by Neal Pollard

It was almost a devastatingly effective cyber-heist. Hackers compromised the Kathmandu-based NIC Asia Bank this fall, fraudulently transferring $4.4 million to destinations in at least six other...

Steals the Deal: Source Code Inspections Herald New Risks for Tech Vendors

by Jill Singer

Software is the invisible underpinning for much of our digital world. At its core is source code: the lingua franca that allows software-based technology systems to operate and evolve. Typically,...

Remembering Civil Liberties when Reforming Foreign Surveillance

by Chris Inglis

The NSA surveillance programs under the authorities laid out in the Foreign Intelligence and Surveillance Act (FISA) Section 702 have been making headlines since former NSA contractor Edward Snowden...

Companies Need to ‘Think Twice’ Before Retaliating Against Hackers

by Bob Gourley

Earlier this month, two members of the House of Representatives Tom Graves (R-GA) and Kyrsten Sinema (D-AZ) introduced a bill called Active Cyber Defense Certainty Act, dubbed the “hack back”...

Shaking Up the Top of Cyber Command

by Jason Healey

As I have previously written, U.S. Cyber Command has grown up, and its elevation to a unified combatant command will soon be complete. The focus can now switch to a far more critical issue: splitting...

Kaspersky Antivirus Hack a Wake Up Call for Business

by Michael Sulmeyer

Russian state-sponsored hackers were able to steal National Security Agency material on methods they use to conduct cyber espionage as well as how they help defend critical U.S. government networks,...

Cyber Command Is Growing Up. Now For the Real Issue.

by Jason Healey

The Cipher Brief Cyber Advisory Board convenes meetings with some of the most innovative thinkers across government and the private sector, tackling a range of cyber threats. Meetings are...

The Making of a Cyber Diplomat

by Michael Sulmeyer and Gabriella Roncone

By now, you’ve probably heard the news that the U.S. State Department is losing its top diplomat on issues relating to cybersecurity, Chris Painter. In addition, the rumors are that those...

When the NSA Spots a Crack in Commercial Software – Should It Tell?

by Natalie Vanatta

One of the only tasks the U.S. Constitution declares that the federal government must do is to provide for the common defense. That is the government’s foundational truth and purpose; to protect...